Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2018-4878
Analyzed
Known KEV
More InfoOfficial Page
Source-psirt@adobe.com
View Known Exploited Vulnerability (KEV) details
Published At-06 Feb, 2018 | 21:29
Updated At-13 Feb, 2025 | 17:38

A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution. This was exploited in the wild in January and February 2018.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
2021-11-032022-05-03Adobe Flash Player Use-After-Free VulnerabilityThe impacted product is end-of-life and should be disconnected if still in use.
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

Adobe Inc.
adobe
>>flash_player>>Versions before 28.0.0.161(exclusive)
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
Apple Inc.
apple
>>macos>>-
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>-
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows>>-
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_desktop>>6.0
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server>>6.0
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_workstation>>6.0
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>flash_player>>Versions before 28.0.0.161(exclusive)
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*
Adobe Inc.
adobe
>>flash_player>>Versions before 28.0.0.161(exclusive)
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_11:*:*
Microsoft Corporation
microsoft
>>windows_10>>*
cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_8.1>>*
cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>flash_player>>Versions before 28.0.0.161(exclusive)
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*
Apple Inc.
apple
>>macos>>-
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
Google LLC
google
>>chrome_os>>-
cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>-
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows>>-
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-416Primarynvd@nist.gov
CWE-416Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://blog.talosintelligence.com/2018/02/group-123-goes-wild.htmlpsirt@adobe.com
Technical Description
Third Party Advisory
http://www.securityfocus.com/bid/102893psirt@adobe.com
Broken Link
http://www.securitytracker.com/id/1040318psirt@adobe.com
Broken Link
https://access.redhat.com/errata/RHSA-2018:0285psirt@adobe.com
Third Party Advisory
https://blog.morphisec.com/flash-exploit-cve-2018-4878-spotted-in-the-wild-massive-malspam-campaignpsirt@adobe.com
Third Party Advisory
https://github.com/InQuest/malware-samples/tree/master/CVE-2018-4878-Adobe-Flash-DRM-UAF-0daypsirt@adobe.com
Third Party Advisory
https://github.com/vysec/CVE-2018-4878psirt@adobe.com
Third Party Advisory
https://helpx.adobe.com/security/products/flash-player/apsb18-03.htmlpsirt@adobe.com
Vendor Advisory
https://securingtomorrow.mcafee.com/mcafee-labs/hackers-bypassed-adobe-flash-protection-mechanism/psirt@adobe.com
Exploit
Third Party Advisory
https://threatpost.com/adobe-flash-player-zero-day-spotted-in-the-wild/129742/psirt@adobe.com
Third Party Advisory
https://www.darkreading.com/threat-intelligence/adobe-flash-vulnerability-reappears-in-malicious-word-files/d/d-id/1331139psirt@adobe.com
Press/Media Coverage
Third Party Advisory
https://www.exploit-db.com/exploits/44412/psirt@adobe.com
Exploit
Third Party Advisory
VDB Entry
https://www.fireeye.com/blog/threat-research/2018/02/attacks-leveraging-adobe-zero-day.htmlpsirt@adobe.com
Third Party Advisory
https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/north-korean-hackers-allegedly-exploit-adobe-flash-player-vulnerability-cve-2018-4878-against-south-korean-targetspsirt@adobe.com
Technical Description
Third Party Advisory
http://blog.talosintelligence.com/2018/02/group-123-goes-wild.htmlaf854a3a-2127-422b-91ae-364da2661108
Technical Description
Third Party Advisory
http://www.securityfocus.com/bid/102893af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securitytracker.com/id/1040318af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://access.redhat.com/errata/RHSA-2018:0285af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://blog.morphisec.com/flash-exploit-cve-2018-4878-spotted-in-the-wild-massive-malspam-campaignaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://github.com/InQuest/malware-samples/tree/master/CVE-2018-4878-Adobe-Flash-DRM-UAF-0dayaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://github.com/vysec/CVE-2018-4878af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://helpx.adobe.com/security/products/flash-player/apsb18-03.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://securingtomorrow.mcafee.com/mcafee-labs/hackers-bypassed-adobe-flash-protection-mechanism/af854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
https://threatpost.com/adobe-flash-player-zero-day-spotted-in-the-wild/129742/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.darkreading.com/threat-intelligence/adobe-flash-vulnerability-reappears-in-malicious-word-files/d/d-id/1331139af854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage
Third Party Advisory
https://www.exploit-db.com/exploits/44412/af854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
VDB Entry
https://www.fireeye.com/blog/threat-research/2018/02/attacks-leveraging-adobe-zero-day.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/north-korean-hackers-allegedly-exploit-adobe-flash-player-vulnerability-cve-2018-4878-against-south-korean-targetsaf854a3a-2127-422b-91ae-364da2661108
Technical Description
Third Party Advisory
Change History
0Changes found

Details not found